HumanCompatibleAI / tensor-trustLinks
A prompt injection game to collect data for robust ML research
☆62Updated 5 months ago
Alternatives and similar repositories for tensor-trust
Users that are interested in tensor-trust are comparing it to the libraries listed below
Sorting:
- ☆75Updated 7 months ago
- Package to optimize Adversarial Attacks against (Large) Language Models with Varied Objectives☆69Updated last year
- Ferret: Faster and Effective Automated Red Teaming with Reward-Based Scoring Technique☆17Updated 10 months ago
- ☆34Updated 8 months ago
- ☆92Updated 2 months ago
- Repo for the research paper "SecAlign: Defending Against Prompt Injection with Preference Optimization"☆58Updated 2 weeks ago
- TaskTracker is an approach to detecting task drift in Large Language Models (LLMs) by analysing their internal activations. It provides a…☆59Updated 4 months ago
- The official repository of the paper "On the Exploitability of Instruction Tuning".☆64Updated last year
- Implementation of BEAST adversarial attack for language models (ICML 2024)☆88Updated last year
- [NDSS'25 Best Technical Poster] A collection of automated evaluators for assessing jailbreak attempts.☆161Updated 3 months ago
- Adversarial Attacks on GPT-4 via Simple Random Search [Dec 2023]☆43Updated last year
- PAL: Proxy-Guided Black-Box Attack on Large Language Models☆51Updated 11 months ago
- Whispers in the Machine: Confidentiality in Agentic Systems☆39Updated last month
- [NeurIPS 2024] Official implementation for "AgentPoison: Red-teaming LLM Agents via Memory or Knowledge Base Backdoor Poisoning"☆130Updated 3 months ago
- WMDP is a LLM proxy benchmark for hazardous knowledge in bio, cyber, and chemical security. We also release code for RMU, an unlearning m…☆128Updated last month
- Dataset for the Tensor Trust project☆43Updated last year
- [ICML 2024] COLD-Attack: Jailbreaking LLMs with Stealthiness and Controllability☆157Updated 6 months ago
- ☆90Updated last year
- ☆72Updated last week
- This repository provides a benchmark for prompt Injection attacks and defenses☆245Updated last month
- Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks [ICLR 2025]☆320Updated 5 months ago
- A benchmark for evaluating the robustness of LLMs and defenses to indirect prompt injection attacks.☆71Updated last year
- Does Refusal Training in LLMs Generalize to the Past Tense? [ICLR 2025]☆69Updated 5 months ago
- [ICML 2024] Agent Smith: A Single Image Can Jailbreak One Million Multimodal LLM Agents Exponentially Fast☆107Updated last year
- [ICLR'24 Spotlight] A language model (LM)-based emulation framework for identifying the risks of LM agents with tool use☆150Updated last year
- Code repo for the paper: Attacking Vision-Language Computer Agents via Pop-ups☆35Updated 6 months ago
- Finding trojans in aligned LLMs. Official repository for the competition hosted at SaTML 2024.☆113Updated last year
- A re-implementation of the "Red Teaming Language Models with Language Models" paper by Perez et al., 2022☆33Updated last year
- ☆31Updated 2 years ago
- Official repository for the paper "ALERT: A Comprehensive Benchmark for Assessing Large Language Models’ Safety through Red Teaming"☆43Updated 9 months ago